Journal articles on the topic 'Wireless metropolitan area networks Standards'

To see the other types of publications on this topic, follow the link: Wireless metropolitan area networks Standards.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Wireless metropolitan area networks Standards.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Sharifullina, Albina Y., Roman R. Galyamov, and Rimma S. Zaripova. "TECHNICAL PRINCIPLES FOR CREATING A WIRELESS LOCAL NETWORK WI-FI." T-Comm 15, no. 7 (2021): 28–33. http://dx.doi.org/10.36724/2072-8735-2021-15-7-28-33.

Full text
Abstract:
This article discusses the stages of development, characteristics of a wireless local area network Wi-Fi, options for its topology and equipment used. Currently, there are such different types of wireless networks as Wireless Wide Area Network, Wireless Metropolitan Area Networks (Wireless Neighborhood Area Network), Wireless Local Area Network, Wireless Personal Area Network. Each of the listed wireless networks has its own specific range and application. Wireless LAN Wi-Fi refers to the Wireless Local Area Network. The first wireless LAN standard, Wi-Fi, was approved in 1997. From the moment of their appearance to the present day, the following standards of this network have appeared: 802.11a, 802.11b, 802.11g, 802.11n, 802.11ac, 802.11ad, 802.11ax. For each standard, the speeds and frequency ranges at which the data transmission was carried out are indicated, and the technologies on which they are built are described. Wireless LAN Wi-Fi has three topologies: 1) Ad-Hoc (point-to-point) or Independent Basic Service Set; 2) Basic Service Set (“client / server”) and 3) Extended Service Set (“extended service areas”). To build a Wi-Fi network, network adapters, access points, routers, ADSL modems, Wi-Fi phones, Wi-Fi antennas, Wi-Fi repeaters are used. Wi-Fi adapters are used by devices that do not have a built-in Wi-Fi module. Wi-Fi access points are designed for organizing wireless access within a local network. Wi-Fi routers are designed to route traffic on a computer network. ADSL modems are used to access the Internet over a telephone line. Wi-Fi repeaters are used to expand the coverage of a wireless network using already installed equipment. Wi-Fi phones are wireless IP phones. Wi-Fi antennas are used to extend the range of a wireless network.
APA, Harvard, Vancouver, ISO, and other styles
2

Trimintzios, Panagiotis, and George Georgiou. "WiFi and WiMAX Secure Deployments." Journal of Computer Systems, Networks, and Communications 2010 (2010): 1–28. http://dx.doi.org/10.1155/2010/423281.

Full text
Abstract:
Wireless Broadband offers incredibly fast, “always on” Internet similar to ADSL and sets the user free from the fixed access areas. In order to achieve these features standardisation was achieved for Wireless LAN (WLANs) and Wireless Metropolitan Area Networks (WMANs) with the advent of IEEE802.11 and IEEE802.16 family of standards, respectively. One serious concern in the rapidly developing wireless networking market has been the security of the deployments since the information is delivered freely in the air and therefore privacy and integrity of the transmitted information, along with the user-authentication procedures, become a very important issue. In this article, we present the security characteristics for the WiFi and the WiMAX networks. We thoroughly present the security mechanisms along with a threat analysis for both IEEE 802.11 and the 802.16 as well as their amendments. We summarise in a comparative manner the security characteristics and the possible residual threats for both standards. Finally focus on the necessary actions and configurations that are needed in order to deploy WiFi and WiMAX with increased levels of security and privacy.
APA, Harvard, Vancouver, ISO, and other styles
3

Diet, Antoine M., Nicolas Ribière-Tharaud, Martine Villegas, and Geneviève Baudoin. "Front-end HPA/antenna for multi-radio." International Journal of Microwave and Wireless Technologies 4, no. 5 (May 1, 2012): 483–93. http://dx.doi.org/10.1017/s1759078712000372.

Full text
Abstract:
This paper focuses on multi-radio front-end transmitter, a function implied by cognitive radio (0.5–6 GHz). S and C bands standards (wireless local and metropolitan area networks) present a challenge, due to the signal modulation schemes (orthogonal frequency division multiplex (OFDM)/WCDMA, wideband code division multiple access) dynamic (tens of dBs), driving us to a mandatory transmitter linearization. The idea is to provide frequency, flexibility, and average power control of a multi-radio high-efficiency front end for such signals (polar/envelope elimination and restoration (EER) structure). The study implies antennas design and average power control demonstration. Based on a switched mode power amplifier (PA), a discrete detuning is possible to adapt the PA at both “WiMAX” and “Wifi5” frequencies. This architecture amplifies signals with amplitude information. This is coded here by the ΣΔ/PWM (pulse width modulation) technique, to present a constant envelope signal. The amplitude information is restored by a pass-band radio frequency (RF) filter. The antenna can be designed with a notch, to reduce the filtering constraints (selectivity and standards coexistences) and to help in the restoration of amplitude information. Average power control is illustrated by voltage supply variation and results are a possible dynamic of 9.5 dB. To complete the analysis, the simulation of the propagation channel, including antennas, with CST (free space, line of sight) is imported under AGILENT-ADS.
APA, Harvard, Vancouver, ISO, and other styles
4

Barceló, J., A. Sfairopoulou, and B. Bellalta. "Wireless open metropolitan area networks." ACM SIGMOBILE Mobile Computing and Communications Review 12, no. 3 (July 31, 2008): 34–44. http://dx.doi.org/10.1145/1462141.1462146.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mollenauer, J. F. "Standards for metropolitan area networks." IEEE Communications Magazine 26, no. 4 (April 1988): 15–19. http://dx.doi.org/10.1109/35.442.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Silvestre, J., V. Sempere, and T. Albero. "WIRELESS METROPOLITAN AREA NETWORKS FOR TELEMONITORING APPLICATIONS." IFAC Proceedings Volumes 40, no. 22 (2007): 261–64. http://dx.doi.org/10.3182/20071107-3-fr-3907.00036.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Coronaro, Massimo, Giuseppe Freschi, Melchiorre Iudica, Claudio Pavanelli, and Daniele Roffinella. "Metropolitan area networks: Standards, services and performance." European Transactions on Telecommunications 2, no. 2 (March 1991): 189–97. http://dx.doi.org/10.1002/ett.4460020210.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hollick, Matthias, Tronje Krop, Jens Schmitt, Hans-Peter Huth, and Ralf Steinmetz. "Modeling mobility and workload for wireless metropolitan area networks." Computer Communications 27, no. 8 (May 2004): 751–61. http://dx.doi.org/10.1016/j.comcom.2003.10.015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zeng, Feng, Yongzheng Ren, Xiaoheng Deng, and Wenjia Li. "Cost-Effective Edge Server Placement in Wireless Metropolitan Area Networks." Sensors 19, no. 1 (December 21, 2018): 32. http://dx.doi.org/10.3390/s19010032.

Full text
Abstract:
Remote clouds are gradually unable to achieve ultra-low latency to meet the requirements of mobile users because of the intolerable long distance between remote clouds and mobile users and the network congestion caused by the tremendous number of users. Mobile edge computing, a new paradigm, has been proposed to mitigate aforementioned effects. Existing studies mostly assume the edge servers have been deployed properly and they just pay attention to how to minimize the delay between edge servers and mobile users. In this paper, considering the practical environment, we investigate how to deploy edge servers effectively and economically in wireless metropolitan area networks. Thus, we address the problem of minimizing the number of edge servers while ensuring some QoS requirements. Aiming at more consistence with a generalized condition, we extend the definition of the dominating set, and transform the addressed problem into the minimum dominating set problem in graph theory. In addition, two conditions are considered for the capacities of edge servers: one is that the capacities of edge servers can be configured on demand, and the other is that all the edge servers have the same capacities. For the on-demand condition, a greedy based algorithm is proposed to find the solution, and the key idea is to iteratively choose nodes that can connect as many other nodes as possible under the delay, degree and cluster size constraints. Furthermore, a simulated annealing based approach is given for global optimization. For the second condition, a greedy based algorithm is also proposed to satisfy the capacity constraint of edge servers and minimize the number of edge servers simultaneously. The simulation results show that the proposed algorithms are feasible.
APA, Harvard, Vancouver, ISO, and other styles
10

Jia, Mike, Weifa Liang, Zichuan Xu, Meitian Huang, and Yu Ma. "QoS-Aware Cloudlet Load Balancing in Wireless Metropolitan Area Networks." IEEE Transactions on Cloud Computing 8, no. 2 (April 1, 2020): 623–34. http://dx.doi.org/10.1109/tcc.2017.2786738.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Pascoe, J. S., V. S. Sunderam, U. Varshney, and R. J. Loader. "Middleware enhancements for metropolitan area wireless Internet access." Future Generation Computer Systems 18, no. 5 (April 2002): 721–35. http://dx.doi.org/10.1016/s0167-739x(02)00037-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Chen, Long, Jigang Wu, Gangqiang Zhou, and Longjie Ma. "QUICK: QoS-guaranteed efficient cloudlet placement in wireless metropolitan area networks." Journal of Supercomputing 74, no. 8 (May 16, 2018): 4037–59. http://dx.doi.org/10.1007/s11227-018-2412-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Jin, Sunggeun, Xi Chen, Daji Qiao, and Sunghyun Choi. "Adaptive sleep mode management in IEEE 802.16m wireless metropolitan area networks." Computer Networks 55, no. 16 (November 2011): 3774–83. http://dx.doi.org/10.1016/j.comnet.2011.03.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Xu, Xiaolong, Rui Huang, Ruihan Dou, Yuancheng Li, Jie Zhang, Tao Huang, and Wenbin Yu. "Energy-Efficient Cloudlet Management for Privacy Preservation in Wireless Metropolitan Area Networks." Security and Communication Networks 2018 (September 24, 2018): 1–13. http://dx.doi.org/10.1155/2018/8180451.

Full text
Abstract:
Currently, cloudlet based wireless metropolitan area network (WMAN) is emerging as an effective paradigm to extend the performance of mobile devices, which enables the execution of computational intensive mobile applications. But the normal operation of cloudlets consumes a large amount of energy, which brings about carbon dioxide emissions, aggravation of the greenhouse effect, etc. Meanwhile the data transmission of various mobile users among cloudlets would cause leakage of personal privacy. In view of this challenge, we propose an energy-efficient cloudlet management method, named ECM, for privacy preservation in WMAN. Technically, an optimization model is designed to formalize our problem. Then, based on live virtual machine (VM) migration technique, a corresponding privacy-aware VM scheduling method for energy saving is designed to determine which VMs should be migrated and where they should be migrated. Finally, experimental data demonstrate that the proposed method is both efficient and effective.
APA, Harvard, Vancouver, ISO, and other styles
15

Xu, Xiaolong, Xihua Liu, Lianyong Qi, Yuhao Chen, Zihao Ding, and Jiangang Shi. "Energy-Efficient Virtual Machine Scheduling across Cloudlets in Wireless Metropolitan Area Networks." Mobile Networks and Applications 25, no. 2 (April 29, 2019): 442–56. http://dx.doi.org/10.1007/s11036-019-01242-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Zhou, Ming-Tuo, Masayuki Oodo, Vinh Dien Hoang, Liru Lu, Xin Zhang, and Hiroshi Harada. "Greater reliability in disrupted metropolitan area networks: use cases, standards, and practices." IEEE Communications Magazine 53, no. 8 (August 2015): 198–207. http://dx.doi.org/10.1109/mcom.2015.7180528.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Guan, Xinjie, Xili Wan, Tianjing Wang, and Yifeng Li. "A Long-Term Cost-Oriented Cloudlet Planning Method in Wireless Metropolitan Area Networks." Electronics 8, no. 11 (October 24, 2019): 1213. http://dx.doi.org/10.3390/electronics8111213.

Full text
Abstract:
As an extension of remote cloud data centers, cloudlets process the workloads from mobile users at the network edge, thereby satisfying the requirements of resource-intensive and latency-sensitive applications. One of the fundamental yet important issues for cloudlet infrastructure providers (ISP) is how to plan the placement and capacities of cloudlets so that minimize their long-term cost with a guarantee on service delay. However, existing work mostly focuses on resource provision or resource management for mobile services on existing cloudlets, while very little attention has been paid to the cloudlet placement and capacity planning problem. In contrast to those studies, we aim to optimize the long-term total cost of cloudlets’ ISPs through intelligently planning the location and capacities of cloudlets under constraints on the service delay experienced by mobile users. This problem is then decomposed into two sub-problems and algorithms are devised to solve it. Evaluations on randomly generated traces and real traces exhibit the superior performance of the proposed solution on saving ISP’s long-term cost.
APA, Harvard, Vancouver, ISO, and other styles
18

Jia, Mike, Jiannong Cao, and Weifa Liang. "Optimal Cloudlet Placement and User to Cloudlet Allocation in Wireless Metropolitan Area Networks." IEEE Transactions on Cloud Computing 5, no. 4 (October 1, 2017): 725–37. http://dx.doi.org/10.1109/tcc.2015.2449834.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Tavera, Carlos A., Jesús H. Ortiz, Osamah I. Khalaf, Diego F. Saavedra, and Theyazn H. H. Aldhyani. "Wearable Wireless Body Area Networks for Medical Applications." Computational and Mathematical Methods in Medicine 2021 (April 24, 2021): 1–9. http://dx.doi.org/10.1155/2021/5574376.

Full text
Abstract:
In recent times, there has been a significant growth in networks known as the wireless body area networks (WBANs). A WBAN connects distributed nodes throughout the human body, which can be placed on the skin, under the skin, or on clothing and can use the human body’s electromagnetic waves. An approach to reduce the size of different telecommunication equipment is constantly being sought; this allows these devices to be closer to the body or even glued and embedded within the skin without making the user feel uncomfortable or posing as a danger for the user. These networks promise new medical applications; however, these are always based on the freedom of movement and the comfort they offer. Among the advantages of these networks is that they can significantly increase user’s quality of life. For example, a person can carry a WBAN with built-in sensors that calculate the user’s heart rate at any given time and send these data over the internet to user’s doctor. This study provides a systematic review of WBAN, describing the applications and trends that have been developed with this type of network and, in addition, the protocols and standards that must be considered.
APA, Harvard, Vancouver, ISO, and other styles
20

E. Ramya, Mrs, and Dr R. Gobinath. "Delay metric in wireless body area sensor net-works." International Journal of Engineering & Technology 7, no. 3.3 (June 8, 2018): 448. http://dx.doi.org/10.14419/ijet.v7i2.33.14208.

Full text
Abstract:
Wireless Sensor Networks have the potential to greatly impact many aspects of medical care. This paper focuses on fundamental idea about the Protocols, standards, Technologies and measurements taken by the Researchers in the area of Wireless Body Area Sensor. This paper also listed various constraints in Wireless Body Area Sensor Networks and noticed the best suitable techniques for analyzing the Sensor Data. The quality of service is the most fundamental characteristics of any applications like Wireless Network, Wireless Sensor Network and Wireless Body Area Network. The performance factor in WBAN still remains trivial whereas performance issues are also a great concern. This paper given the effort to analyze and present some of the protocols and technologies developed toward performance issues in WBAN.
APA, Harvard, Vancouver, ISO, and other styles
21

Bradai, Nourchene, Lamia Chaari, and Lotfi Kamoun. "A Comprehensive Overview of Wireless Body Area Networks (WBAN)." International Journal of E-Health and Medical Communications 2, no. 3 (July 2011): 1–30. http://dx.doi.org/10.4018/jehmc.2011070101.

Full text
Abstract:
In recent years, the wireless body area network (WBAN) has emerged as a new technology for e-healthcare applications. The WBANs promise to revolutionize health monitoring. However, this technology remains in the first stages and much research is underway. Designers of such systems face a number of challenging tasks, as they need to address conflicting requirements. This includes managing the network, the data, while maximizing the autonomy of each network node. Reducing the consumption of a node, the management of network resources and security insurance are therefore major challenges. This paper presents a survey of body area networks including the WBANs challenges and -architecture, the most important body sensor devices, as well as sensor board hardware and platforms. Further, various applications of WBANs in the medical field are discussed, as well as wireless communications standards and technologies. The newest researches related to WBANs at physical and MAC layers are presented. Finally the paper identifies data security and privacy in WBANs as well as open research issues.
APA, Harvard, Vancouver, ISO, and other styles
22

Li, Xingcun, Feng Zeng, Guanyun Fang, Yinan Huang, and Xunlin Tao. "Load balancing edge server placement method with QoS requirements in wireless metropolitan area networks." IET Communications 14, no. 21 (December 2020): 3907–16. http://dx.doi.org/10.1049/iet-com.2020.0651.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Zhang, Jianshan, Ming Li, Xianghan Zheng, and Ching-Hsien Hsu. "A Time-Driven Cloudlet Placement Strategy for Workflow Applications in Wireless Metropolitan Area Networks." Sensors 22, no. 9 (April 29, 2022): 3422. http://dx.doi.org/10.3390/s22093422.

Full text
Abstract:
With the rapid development of mobile technology, mobile applications have increasing requirements for computational resources, and mobile devices can no longer meet these requirements. Mobile edge computing (MEC) has emerged in this context and has brought innovation into the working mode of traditional cloud computing. By provisioning edge server placement, the computing power of the cloud center is distributed to the edge of the network. The abundant computational resources of edge servers compensate for the lack of mobile devices and shorten the communication delay between servers and users. Constituting a specific form of edge servers, cloudlets have been widely studied within academia and industry in recent years. However, existing studies have mainly focused on computation offloading for general computing tasks under fixed cloudlet placement positions. They ignored the impact on computation offloading results from cloudlet placement positions and data dependencies among mobile application components. In this paper, we study the cloudlet placement problem based on workflow applications (WAs) in wireless metropolitan area networks (WMANs). We devise a cloudlet placement strategy based on a particle swarm optimization algorithm using genetic algorithm operators with the encoding library updating mode (PGEL), which enables the cloudlet to be placed in appropriate positions. The simulation results show that the proposed strategy can obtain a near-optimal cloudlet placement scheme. Compared with other classic algorithms, this algorithm can reduce the execution time of WAs by 15.04–44.99%.
APA, Harvard, Vancouver, ISO, and other styles
24

Figueiredo, F. L., and P. Cardieri. "Coverage prediction and performance evaluation of wireless metropolitan area networks based on IEEE 802.16." Journal of Communication and Information Systems 20, no. 3 (December 30, 2005): 132–40. http://dx.doi.org/10.14209/jcis.2005.20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Belbekkouche, Abdeltouab, Jihene Rezgui, and Abdelhakim Hafid. "Wireless mesh and optical burst switching convergence for a novel metropolitan area network architecture." Computer Networks 55, no. 1 (January 2011): 159–72. http://dx.doi.org/10.1016/j.comnet.2010.08.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Meneses, Gustavo. "Sensor Networks for Monitoring Metro-de-Medellín System Infrastructure." KnE Engineering 3, no. 1 (February 11, 2018): 862. http://dx.doi.org/10.18502/keg.v3i1.1507.

Full text
Abstract:
Structural health monitoring systems rely on electronic instrumentation and telemetry for improving maintenance tasks, preventing catastrophic failures and following the behavior of critical variables for infrastructure works such as tunnels, highways, bridges and buildings. A proposal for the development of sensor networks for monitoring Metro-de-Medellín system infrastructure is presented. The adopted approach is based on the deployment of generic sensing units that can operate either individually or by constituting wireless personal area networks un-der the MiWi P2P protocol from Microchip. Different transceivers can be added to monitoring units that can act as gateways in order to allow collected data reach other networks, ranging from local area to metropolitan area coverage. Several sensors, digital and analog, can be attached to the generic units depending on the particular requirements of specific situations and monitoring locations. The results obtained from performed tests and the options considered for graphical user interfaces are also presented.Keywords: MiWi Protocol, Structural Health Monitoring, Short Data Service, Terrestrial Trunked Radio, Wireless Sensor Networks.
APA, Harvard, Vancouver, ISO, and other styles
27

Shao, Yanling, Zhen Shen, Siliang Gong, and Hanyao Huang. "Cost-Aware Placement Optimization of Edge Servers for IoT Services in Wireless Metropolitan Area Networks." Wireless Communications and Mobile Computing 2022 (July 27, 2022): 1–17. http://dx.doi.org/10.1155/2022/8936576.

Full text
Abstract:
Edge computing migrates cloud computing capacity to the edge of the network to reduce latency caused by congestion and long propagation distance of the core network. And the Internet of things (IoT) service requests with large data traffic submitted by users need to be processed quickly by corresponding edge servers. The closer the edge computing resources are to the user network access point, the better the user experience can be improved. On the other hand, the closer the edge server is to users, the fewer users will access simultaneously, and the utilization efficiency of nodes will be reduced. The capital investment cost is limited for edge resource providers, so the deployment of edge servers needs to consider the trade-off between user experience and capital investment cost. In our study, for edge server deployment problems, we summarize three critical issues: edge location, user association, and capacity at edge locations through the research and analysis of edge resource allocation in a real edge computing environment. For these issues, this study considers the user distribution density (load density), determines a reasonable deployment location of edge servers, and deploys an appropriate number of edge computing nodes in this location to improve resource utilization and minimize the deployment cost of edge servers. Based on the objective minimization function of construction cost and total access delay cost, we formulate the edge server placement as a mixed-integer nonlinear programming problem (MINP) and then propose an edge server deployment optimization algorithm to seek the optimal solution (named Benders_SD). Extensive simulations and comparisons with the other three existing deployment methods show that our proposed method achieved an intended performance. It not only meets the low latency requirements of users but also reduces the deployment cost.
APA, Harvard, Vancouver, ISO, and other styles
28

Xu, Zhanyang, Renhao Gu, Tao Huang, Haolong Xiang, Xuyun Zhang, Lianyong Qi, and Xiaolong Xu. "An IoT-Oriented Offloading Method with Privacy Preservation for Cloudlet-Enabled Wireless Metropolitan Area Networks." Sensors 18, no. 9 (September 10, 2018): 3030. http://dx.doi.org/10.3390/s18093030.

Full text
Abstract:
With the development of the Internet of Things (IoT) technology, a vast amount of the IoT data is generated by mobile applications from mobile devices. Cloudlets provide a paradigm that allows the mobile applications and the generated IoT data to be offloaded from the mobile devices to the cloudlets for processing and storage through the access points (APs) in the Wireless Metropolitan Area Networks (WMANs). Since most of the IoT data is relevant to personal privacy, it is necessary to pay attention to data transmission security. However, it is still a challenge to realize the goal of optimizing the data transmission time, energy consumption and resource utilization with the privacy preservation considered for the cloudlet-enabled WMAN. In this paper, an IoT-oriented offloading method, named IOM, with privacy preservation is proposed to solve this problem. The task-offloading strategy with privacy preservation in WMANs is analyzed and modeled as a constrained multi-objective optimization problem. Then, the Dijkstra algorithm is employed to evaluate the shortest path between APs in WMANs, and the nondominated sorting differential evolution algorithm (NSDE) is adopted to optimize the proposed multi-objective problem. Finally, the experimental results demonstrate that the proposed method is both effective and efficient.
APA, Harvard, Vancouver, ISO, and other styles
29

Xu, Xiaolong, Yuancheng Li, Tao Huang, Yuan Xue, Kai Peng, Lianyong Qi, and Wanchun Dou. "An energy-aware computation offloading method for smart edge computing in wireless metropolitan area networks." Journal of Network and Computer Applications 133 (May 2019): 75–85. http://dx.doi.org/10.1016/j.jnca.2019.02.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Zhao, Xu, Chaowei Lin, and Jianshan Zhang. "Cloudlet deployment for workflow applications in a mobile edge computing-wireless metropolitan area network." Peer-to-Peer Networking and Applications 15, no. 1 (January 2022): 739–50. http://dx.doi.org/10.1007/s12083-021-01279-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Choudhary, Amit, M. Nizamuddin, Manish Zadoo, and Vibhav Kumar Sachan. "Multi-objective optimization framework complying IEEE 802.15.6 communication standards for wireless body area networks." Wireless Networks 26, no. 6 (April 28, 2020): 4339–62. http://dx.doi.org/10.1007/s11276-020-02342-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Efstathiou, Dimitrios, and Kiriakos Gavouchidis. "OVERVIEW OF MEDIUM ACCESS CONTROL (MAC) LAYER STANDARDS FOR WIRELESS BODY AREA NETWORKS (WBAN)." Far East Journal of Electronics and Communications 18, no. 4 (May 1, 2018): 547–68. http://dx.doi.org/10.17654/ec018040547.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Pushpan, Sangeetha, and Bhanumathi Velusamy. "Fuzzy-Based Dynamic Time Slot Allocation for Wireless Body Area Networks." Sensors 19, no. 9 (May 7, 2019): 2112. http://dx.doi.org/10.3390/s19092112.

Full text
Abstract:
With the advancement in networking, information and communication technologies, wireless body area networks (WBANs) are becoming more popular in the field of medical and non-medical applications. Real-time patient monitoring applications generate periodic data in a short time period. In the case of life-critical applications, the data may be bursty. Hence the system needs a reliable energy efficient communication technique which has a limited delay. In such cases the fixed time slot assignment in medium access control standards results in low system performance. This paper deals with a dynamic time slot allocation scheme in a fog-assisted network for a real-time remote patient monitoring system. Fog computing is an extended version of the cloud computing paradigm, which is suitable for reliable, delay-sensitive life-critical applications. In addition, to enhance the performance of the network, an energy-efficient minimum cost parent selection algorithm has been proposed for routing data packets. The dynamic time slot allocation uses fuzzy logic with input variables as energy ratio, buffer ratio, and packet arrival rate. Dynamic slot allocation eliminates the time slot wastage, excess delay in the network and attributes a high level of reliability to the network with maximum channel utilization. The efficacy of the proposed scheme is proved in terms of packet delivery ratio, average end to end delay, and average energy consumption when compared with the conventional IEEE 802.15.4 standard and the tele-medicine protocol.
APA, Harvard, Vancouver, ISO, and other styles
34

Leung, V. C. M., N. Qian, A. D. Malyan, and R. W. Donaldson. "Call control and traffic transport for connection-oriented high speed wireless personal communications over metropolitan area networks." IEEE Journal on Selected Areas in Communications 12, no. 8 (1994): 1376–88. http://dx.doi.org/10.1109/49.329338.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Rezaei, Fahimeh, Michael Hempel, and Hamid Sharif. "A Survey of Recent Trends in Wireless Communication Standards, Routing Protocols, and Energy Harvesting Techniques in E-Health Applications." International Journal of E-Health and Medical Communications 6, no. 1 (January 2015): 1–21. http://dx.doi.org/10.4018/ijehmc.2015010101.

Full text
Abstract:
One of the most rapidly growing technology areas is the advances in sensing, networking, and miniaturization in medical domain, which enables innovative new applications. This is especially apparent in e-Health and telemedicine. There is an enormous demand for innovation in wireless sensor networking, body area networks, network security and routing, and many other areas, attracting the attention of numerous researchers. With all the advances it can be challenging to identify trends and areas with opportunities for research engagement. In this paper, the authors therefore review the state-of-the-art in wireless communication used in telemedicine and e-Health applications – ranging from the Wide Area Networks to Body Area Networks – and discuss the studies and literature that employ these technologies for e-Health applications. Moreover, recent routing protocols and techniques that are used for Body Area Networks are investigated. One key challenge for e-Health applications, particularly for mobile or patient-worn devices, is energy consumption and supply. One possible solution is found in energy harvesting, and our survey encompasses current challenges and accomplishments in its application to e-Health and discuss various promising techniques.
APA, Harvard, Vancouver, ISO, and other styles
36

Lin, Cheng-Hung, Hsin-Hao Su, Tang-Syun Chen, and Cheng-Kai Lu. "Reconfigurable Low-Density Parity-Check (LDPC) Decoder for Multi-Standard 60 GHz Wireless Local Area Networks." Electronics 11, no. 5 (February 26, 2022): 733. http://dx.doi.org/10.3390/electronics11050733.

Full text
Abstract:
In this study, a reconfigurable low-density parity-check (LDPC) decoder is designed with good hardware sharing for IEEE 802.15.3c, 802.11ad, and 802.11ay standards. This architecture flexibly supports 12 types of parity-check matrix. The switching network adopts an architecture that can flexibly switch between different inputs and achieves a low hardware complexity. The check node unit adopts a switchable 8/16/32 reconfigurable structure to match different row weights at different code rates and uses the normalised probability min-sum algorithm to simplify the structure of searching for the minimum value. Finally, the chip is implemented using the TSMC 40 nm CMOS process, based on the IEEE 802.11ad standard decoder, extended to support the IEEE 802.15.3c standard, and upwardly compatible with the next-generation advanced standard IEEE 802.11ay. The chip core size was 1.312 mm × 1.312 mm, the operating frequency was 117 MHz when the maximum number of iterations was five with the power consumption of 57.1 mW, and the throughput of 5.24 Gbps and 3.90 Gbsp was in the IEEE 802.11ad and 802.5.3c standards, respectively.
APA, Harvard, Vancouver, ISO, and other styles
37

Ullah, Insaf, Muhammad Asghar Khan, Ako Muhammad Abdullah, Fazal Noor, Nisreen Innab, and Chien-Ming Chen. "Enabling Secure Communication in Wireless Body Area Networks with Heterogeneous Authentication Scheme." Sensors 23, no. 3 (January 18, 2023): 1121. http://dx.doi.org/10.3390/s23031121.

Full text
Abstract:
Thanks to the widespread availability of Fifth Generation (5G) wireless connectivity, it is now possible to provide preventative or proactive healthcare services from any location and at any time. As a result of this technological improvement, Wireless Body Area Networks (WBANs) have emerged as a new study of research in the field of healthcare in recent years. WBANs, on the one hand, intend to gather and monitor data from the human body and its surroundings; on the other hand, biomedical devices and sensors interact through an open wireless channel, making them exposed to a range of cyber threats. However, WBANs are a heterogeneous-based system; heterogeneous cryptography is necessary, in which the transmitter and receiver can employ different types of public key cryptography. This article proposes an improved and efficient heterogeneous authentication scheme with a conditional privacy-preserving strategy that provides secure communication in WBANs. In the proposed scheme, we employed certificateless cryptography on the client side and Identity-Based Cryptography on the receiver side. The proposed scheme employs Hyperelliptic Curve Cryptography (HECC), a more advanced variation of Elliptic Curve Cryptography (ECC). HECC achieves the same level of security with a smaller key size and a more efficient approach than its counterpart methods. The proposed scheme not only meets the security and privacy standards of WBANs but also enhances efficiency in terms of computation and communication costs, according to the findings of the security and performance analysis.
APA, Harvard, Vancouver, ISO, and other styles
38

Yadav, R. Meghana. "TURBO Coded OFDM Improves BER Performance Evaluation for Digital Video Broadcasting." International Journal for Research in Applied Science and Engineering Technology 9, no. 9 (September 30, 2021): 1950–54. http://dx.doi.org/10.22214/ijraset.2021.38220.

Full text
Abstract:
Abstract: Turbo coded Orthogonal Frequency Division Multiplexing (OFDM) is attractive technique for high data rate in wireless communication applications, mobile communications (4G) and Wireless Metropolitan Area Networks (WMAN) and Digital Video Broadcasting (DVB). The performance of TURBO Coded 16 QAM and 64 QAM schemes with OFDM for high speed data rate applications is compared which is used in digital video broadcasting. BER analysis is used to assess the system's performance. Due to the high data rate of 64 QAM, attaining BER of ૚૙ି૝ requires Eb/No of 0.9 dB in 16QAM, whereas obtaining BER of ૚૙ି૝ requires 0.17 dB in 64QAM. By using OFDM removes Inter Symbol Interference (ISI) and Adjacent Channel Interference (ACI). Keywords: Wireless communication, mobile communication, OFDM, QAM, TURBO Encoding
APA, Harvard, Vancouver, ISO, and other styles
39

Ali, Syed, Ki-dong Lee, and Victor Leung. "Dynamic resource allocation in OFDMA wireless metropolitan area networks [Radio Resource Management and Protocol Engineering for IEEE 802.16]." IEEE Wireless Communications 14, no. 1 (February 2007): 6–13. http://dx.doi.org/10.1109/mwc.2007.314545.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Dzhuliy, V. M., A. V. Krasnik, E. S. Lenkov, M. M. Okhramovich, and L. O. Ryaba. "STUDY OF PROBLEMS OF CONSTRUCTION OF SAFE SENSOR NETWORKS." Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University, no. 75 (2022): 51–65. http://dx.doi.org/10.17721/2519-481x/2022/75-06.

Full text
Abstract:
The research of problems of construction of wireless sensor networks is carried out in the work, the main stage of their decision is development of models of the description of a sensor network and the corresponding methods, technologies of maintenance of necessary parameters of quality of functioning of a sensor network. The study involves the consideration of basic technologies and standards in which there is an opportunity to implement the creation of wireless sensor networks. The basis of wireless sensor networks are communication channels organized between network elements using appropriate wireless technology. The main tasks of building wireless sensor networks: determining traffic parameters; determining the list of services; development or selection of a network model; determination of network functioning indicators; solving the problem of compromise between the quality of operation, traffic and resources. A number of wireless networking technologies are widespread in corporate networks, use an unlicensed frequency band, and in private networks, which allows their use in a number of tasks, due to the density of devices that support them and the availability of technology. A number of technologies do not support the functions of self-organization of the communication network. Such mechanisms can be implemented using software and related protocols at the network level. Existing technologies have the ability to organize communication from tens to tens of thousands of meters. For specific applications, it is one of the essential factors in choosing the appropriate technology. The probability of connectivity in wireless sensor networks depends on the structure and parameters that determine the network: characteristics of the service area (volume, flat, configuration, geometric dimensions), number of network nodes, characteristics of communication capabilities of network elements, antenna patterns, standards and protocols, communication range, transmitter power), features of the involved routing protocols. Features of providing connectivity in wireless sensor networks lie in the possibility of using gateways built using various technologies, which can significantly expand the capabilities of wireless networks in increasing the likelihood of connectivity. A feature of the construction of wireless sensor networks are significant differences in traffic servicing in the networks of different technologies used. Indicators of the quality of wireless networks, such as bandwidth, delay, probability of loss are interdependent and show how effectively the sensor network works. When you change one of the performance indicators of wireless sensor networks, it affects other quality indicators.
APA, Harvard, Vancouver, ISO, and other styles
41

Blake, Paul. "CDROM NETWORK PRICING." Online and CD-Rom Review 17, no. 2 (February 1, 1993): 105–8. http://dx.doi.org/10.1108/eb024431.

Full text
Abstract:
CDROM network pricing was discussed by over 50 members of the CDROM Standards and Practices Action Group (CDROM SPAG) at the Barbican in London, England last month. Debate ranged from discussing whether standard net‐work pricing was possible, views of users and publishers on metering, and the likely impact of large Metropolitan Area Networks. The day's programme, organised by TFPL, began with two publishers, then two users, discussing their views on networking licensing, before the debate was thrown open to the floor.
APA, Harvard, Vancouver, ISO, and other styles
42

Viehland, Dennis, and Fei Zhao. "The Future of Personal Area Networks in a Ubiquitous Computing World." International Journal of Advanced Pervasive and Ubiquitous Computing 2, no. 2 (April 2010): 30–44. http://dx.doi.org/10.4018/japuc.2010040102.

Full text
Abstract:
In the future world of ubiquitous computing, wireless devices will be everywhere. Personal area networks (PANs) will enable communications between devices both embedded in the environment and mobile on vehicles and persons. This research determines the future prospects of PANs by examining (a) criteria that will lead to success, (b) barriers to implementation, and (c) key applications. An initial set of issues in each of these areas is identified from the literature. The Delphi Method is used to determine what experts believe what are the most important success criteria, barriers, and applications. Critical success factors that will determine the future of personal area networks include reliability of connections, interoperability, and usability. Important barriers that may inhibit the deployment of PAN are security, interference and coexistence, and regulation and standards. Key applications for PAN success include monitoring, healthcare, and smart things.
APA, Harvard, Vancouver, ISO, and other styles
43

Parashar, Vivek, Ramgopal Kashyap, Ali Rizwan, Dimitrios A. Karras, Gilder Cieza Altamirano, Ekta Dixit, and Fardin Ahmadi. "Aggregation-Based Dynamic Channel Bonding to Maximise the Performance of Wireless Local Area Networks (WLAN)." Wireless Communications and Mobile Computing 2022 (June 7, 2022): 1–11. http://dx.doi.org/10.1155/2022/4464447.

Full text
Abstract:
Channel bonding is considered by the IEEE 802.11ac amendment to improve wireless local area network (WLAN) performance. In this article, the channel bonding and aggregation method were proposed to increase wireless local area network performance (WLANs). It combines many channels (or lanes) to boost the capacity of modem traffic. Channel bonding is the combination of two neighbouring channels within a certain frequency band to increase wireless device throughput. Wi-Fi employs channel bonding, also known as Ethernet bonding. Channel bandwidth is equal to the uplink/downlink ratio multiplied by the operational capacity. A single 20 MHz channel is divided into two, four, or eight power channels. At 80 MHz, there are more main and smaller channels. Performance of short-range WLANs is determined through graph-based approach. The two-channel access techniques including channel bonding proposed for the IEEE 802.11ac amendment are analysed and contrasted. The novel channel sizing algorithm based on starvation threshold is proposed to expand the channel size to improve WLAN performance. Second-cycle throughput is estimated at 20 Mbps, much beyond the starvation threshold. Our test reveals access points (AP) 1, 2, and 4 have enough throughput. A four-AP WLAN with a 5-Mbps starvation threshold is presented. C160 = 1 since there is only one 160 MHz channel. MIR (3, 160 (a, a, a)) =0, indicating that AP 3’s predicted throughput is 0. The algorithm rejects the 160 MHz channel width since ST is larger than 0. The channel width in MHz is given by B =0,1 MIR. The MIR was intended to maximise simultaneous broadcasts in WLANs. The authors claim that aggregation with channel bonding outperforms so all WLAN APs should have a single-channel width. It usually outperforms fairness-based measures by 15% to 20%. Wi-Fi standards advise “channel bonding,” or using higher frequency channels. Later standards allow channel bonding by increasing bands and channel lengths. Wider channels enhance average WLAN AP throughput, but narrower channels reduce appetite. Finally, it is concluded that APs are more useful than STAs.
APA, Harvard, Vancouver, ISO, and other styles
44

Shrivastava, Vineeta, and Mayank Namdev. "A Review on Security and Privacy Issues in Wireless Body Area Networks for Healthcare Applications." SMART MOVES JOURNAL IJOSCIENCE 5, no. 11 (November 19, 2019): 22–28. http://dx.doi.org/10.24113/ijoscience.v5i11.246.

Full text
Abstract:
Wireless Body Area Network (WBAN) is a new trend in the technology that provides remote mechanism to monitor and collect patient’s health record data using wearable sensors. It is widely recognized that a high level of system security and privacy play a key role in protecting these data when being used by the healthcare professionals and during storage to ensure that patient’s records are kept safe from intruder’s danger. It is therefore of great interest to discuss security and privacy issues in WBANs. In this paper, we reviewed WBAN communication architecture, security and privacy requirements and security threats and the primary challenges in WBANs to these systems based on the latest standards and publications. This paper also covers the state-of-art security measures and research in WBAN.
APA, Harvard, Vancouver, ISO, and other styles
45

Shrivastava, Vineeta, and Mayank Namdev. "A Review on Security and Privacy Issues in Wireless Body Area Networks for Healthcare Applications." SMART MOVES JOURNAL IJOSCIENCE 5, no. 11 (November 19, 2019): 1–7. http://dx.doi.org/10.24113/10.24113/ijoscience.v5i11.246.

Full text
Abstract:
Wireless Body Area Network (WBAN) is a new trend in the technology that provides remote mechanism to monitor and collect patient’s health record data using wearable sensors. It is widely recognized that a high level of system security and privacy play a key role in protecting these data when being used by the healthcare professionals and during storage to ensure that patient’s records are kept safe from intruder’s danger. It is therefore of great interest to discuss security and privacy issues in WBANs. In this paper, we reviewed WBAN communication architecture, security and privacy requirements and security threats and the primary challenges in WBANs to these systems based on the latest standards and publications. This paper also covers the state-of-art security measures and research in WBAN.
APA, Harvard, Vancouver, ISO, and other styles
46

Tran, Bao Ngoc, and Phu Cong Nguyen. "AMIMA - A SOFTWARE SOLUTION FOR SECURITY IN WLAN." Science and Technology Development Journal 12, no. 11 (June 15, 2009): 39–48. http://dx.doi.org/10.32508/stdj.v12i11.2310.

Full text
Abstract:
Wireless local area networks have become more and more popular. They had been installed by businesses of all types. The IEEE 802.11 standards were developed for WLAN. However, sources have shown that even the new standards are flawed, attackers to perpetrate attac.called AMIMA (Against Man-in-the-Middle Attacks), to defend against this type of attacks. In this solution, the "delayed password disclosure" technique is used for authentication phase, IPSec and VPN technique will be used for data exchange phase.
APA, Harvard, Vancouver, ISO, and other styles
47

Peng, Kai, Xingda Qian, Bohai Zhao, Kejia Zhang, and Yang Liu. "A New Cloudlet Placement Method Based on Affinity Propagation for Cyber-Physical-Social Systems in Wireless Metropolitan Area Networks." IEEE Access 8 (2020): 34313–25. http://dx.doi.org/10.1109/access.2020.2974895.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Veiga, Adonay, and Claudia Abbas. "Proposal and Application of Bluetooth Mesh Profile for Smart Cities’ Services." Smart Cities 2, no. 1 (December 26, 2018): 1–19. http://dx.doi.org/10.3390/smartcities2010001.

Full text
Abstract:
‘Smart cities’ is a concept that embraces many technologies and solutions in sensing and carrying a city’s data through a network for further processing and analysis. Smart cities’ main priority is citizens and environmental sustainability. In practice, wireless sensors networks over mesh networks are the approach employed most of the time. In terms of wireless communications technologies, Bluetooth low energy offers a robust, low cost, and low power consumption option. The recently published Bluetooth mesh profile specification addresses the most relevant challenges on that paradigm, adding secure multicast communications capabilities. A framework to create Smart Cities services was proposed and a traffic light service was used to demonstrate specification applicability for smart cities’ services. The proposed service showed that data may be collected and shared between devices in a mesh network through and over a metropolitan area. The specification’s strengths were demonstrated and some topics for further development were identified.
APA, Harvard, Vancouver, ISO, and other styles
49

Eliseev, I. V., B. M. Shifrin, M. A. Novikova, and V. A. Sokolova. "Integration of the “smart home” concept into the infrastructure of the modern city." E3S Web of Conferences 124 (2019): 05089. http://dx.doi.org/10.1051/e3sconf/201912405089.

Full text
Abstract:
Currently, the experience of implementing building automation systems shows that many leading manufacturers of equipment and software in this area are trying to develop their own protocols, standards and interfaces for data transfer and control at the lower level of interaction, which generally complicates and increases the cost of implementing projects using equipment and technologies of various manufacturers, and also lowers the level of security and fault tolerance of such systems. rThe main idea is to integrate various elements of a distributed system for managing the infrastructure of objects into a single network data transfer infrastructure using standards that describe the interaction in wired and wireless local area networks.
APA, Harvard, Vancouver, ISO, and other styles
50

Zhao, Wei, and Wen-Hsing Kuo. "Utility-Based Wireless Routing Algorithm for Massive MIMO Heterogeneous Networks." Applied Sciences 10, no. 20 (October 17, 2020): 7261. http://dx.doi.org/10.3390/app10207261.

Full text
Abstract:
With the development of 5G communication, massive multiple input multiple output (MIMO) technology is getting more and more attention. Massive MIMO uses a large amount of simultaneous transmitting and receiving antennas to reduce power consumption and raise the level of transmission quality. Meanwhile, the diversification of user equipment (UE) in the 5G environment also makes heterogeneous networks (HetNets) more prevalent. HetNets allow UE of different network standards to access small cells, while the base stations of small cells access a macro base station (BS) to form a multihop wireless heterogeneous backhaul network. However, how to effectively combine these two technologies by efficiently allocating the antennas of each BS during the route construction process of heterogeneous wireless backhaul networks is still an important issue that is yet to be solved. In this paper, we propose an algorithm called preallocated sequential routing (PSR). Based on the links’ channel conditions and the available antennas and location of BSs, it builds a wireless heterogeneous network backhaul topology and adjusts each link’s transmitting and receiving antennas to maximize total utility. Simulation results showed that the proposed algorithm significantly improved the overall utility and the utility of the outer area of heterogeneous networks.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography